/[LeafOK_CVS]/lbbs/src/test_ssh_server.c
ViewVC logotype

Diff of /lbbs/src/test_ssh_server.c

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.13 by sysadm, Tue Nov 4 14:58:56 2025 UTC Revision 1.16 by sysadm, Fri Nov 28 03:23:58 2025 UTC
# Line 8  Line 8 
8    
9  // This test was written based on libssh example/proxy.c  // This test was written based on libssh example/proxy.c
10    
11    #ifdef HAVE_CONFIG_H
12    #include "config.h"
13    #endif
14    
15  #include "log.h"  #include "log.h"
16  #include <stdio.h>  #include <stdio.h>
17  #include <libssh/callbacks.h>  #include <libssh/callbacks.h>
18  #include <libssh/libssh.h>  #include <libssh/libssh.h>
19  #include <libssh/server.h>  #include <libssh/server.h>
20    
21  #ifndef BUF_SIZE  enum test_ssh_server_constant_t
22  #define BUF_SIZE 2048  {
23  #endif          BUF_SIZE = 2048,
24    };
25    
26  #define SSH_HOST_RSA_KEYFILE "../conf/ssh_host_rsa_key"  static const char SSH_HOST_RSA_KEY_FILE[] = "../conf/ssh_host_rsa_key";
27    static const char SSH_HOST_ED25519_KEY_FILE[] = "../conf/ssh_host_ed25519_key";
28    
29  #define USER "test"  static const char USER[] = "test";
30  #define PASSWORD "123456"  static const char PASSWORD[] = "123456";
31    
32  static ssh_channel SSH_channel;  static ssh_channel SSH_channel;
33  static int authenticated = 0;  static int authenticated = 0;
# Line 112  int ssh_server(const char *hostaddr, uns Line 118  int ssh_server(const char *hostaddr, uns
118          char host[128] = "";          char host[128] = "";
119          int i, r;          int i, r;
120    
121            int ssh_key_valid = 0;
122          int ssh_log_level = SSH_LOG_PROTOCOL;          int ssh_log_level = SSH_LOG_PROTOCOL;
123    
124          ssh_init();          ssh_init();
125    
126          sshbind = ssh_bind_new();          sshbind = ssh_bind_new();
127    
128            if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_RSA_KEY_FILE) < 0)
129            {
130                    log_error("Error setting SSH RSA key: %s\n", SSH_HOST_RSA_KEY_FILE);
131            }
132            else
133            {
134                    ssh_key_valid = 1;
135            }
136            if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_ED25519_KEY_FILE) < 0)
137            {
138                    log_error("Error setting SSH ED25519 key: %s\n", SSH_HOST_ED25519_KEY_FILE);
139            }
140            else
141            {
142                    ssh_key_valid = 1;
143            }
144    
145            if (!ssh_key_valid)
146            {
147                    log_error("Error: no valid SSH host key\n");
148                    ssh_bind_free(sshbind);
149                    return -1;
150            }
151    
152          if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||          if (ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDADDR, hostaddr) < 0 ||
153                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_BINDPORT, &port) < 0 ||
154                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY, SSH_HOST_RSA_KEYFILE) < 0 ||                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-ed25519") < 0 ||
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HOSTKEY_ALGORITHMS, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||  
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_PUBKEY_ACCEPTED_KEY_TYPES, "ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256") < 0 ||  
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_KEY_EXCHANGE, "curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1") < 0 ||  
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_C_S, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||  
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_HMAC_S_C, "umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1") < 0 ||  
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_C_S, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||  
                 ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_CIPHERS_S_C, "chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com") < 0 ||  
155                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)                  ssh_bind_options_set(sshbind, SSH_BIND_OPTIONS_LOG_VERBOSITY, &ssh_log_level) < 0)
156          {          {
157                  log_error("Error setting SSH bind options: %s\n", ssh_get_error(sshbind));                  log_error("Error setting SSH bind options: %s\n", ssh_get_error(sshbind));


Legend:
Removed lines/characters  
Changed lines/characters
  Added lines/characters

webmaster@leafok.com
ViewVC Help
Powered by ViewVC 1.3.0-beta1